Live Chat Software

Additional Content

WhiteboxCRYPTO Strength of Security

This white paper, courtesy of Microsemi, describes the company's white-box cryptography product, WhiteboxCRYPTO™. Further, it also describes the structure of the white-box algorithms, how this structure differentiates white-box cryptography from classical algorithms, and why these structures are far more secure than classical software crypto implementations.

Technology Overdrive

Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.  

Principles of Automotive Cyber-Security

Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.  

Autonomous Vehicle Technology

This thorough, 200-page report, courtesy of the RAND Transportation, Space, and Technology Program, explores legislative activity, cyber hacks, the role of telematics and communications, and liability implications, among many other topics surrounding autonomous cars.

"The Industry should learn from the Software Sector" - Challenges for Automotive Cyber Security

Automotive IQ had the opportunity to interview Dr. Siraj Ahmed Shaikh, Expert in Cyber Security from Coventry University and Chairman at last year's conference, on the current challenges within the industry. See what they are!

Automotive Cyber Security - Attendee Snapshot

Complete the fields below to receive your copy of the Attendee Snapshot. Check out who you can expect to meet at the Summit this fall!

Audio Session - What Does it Mean to Create a Secure Platform?

Hadi Nahari, Chief Security Architect at NVIDIA, presented this session at the last summit. Within he identifies the process by which development of a secure platform is achieved. Have a listen!

Audio Session - Building Comprehensive Security into Cars

Did you miss Brian Witten's session at the last summit? He is the Senior Director, Internet of Things at Symantec Corporation, and his session was rated at 4.5/5 by attendees. Listen to the full 43-minute summit session here for free!

Audio Workshop- Communications: Data Privacy & the Standardization of Security Protocols and Requirements

Josh Corman, Founder of I am the Cavalry, presented this workshop at the past summit. Listen to the full presentation and learn how to apply standardized security protocols to your cyber security ecosystem.

Remote Exploitation of an Unaltered Passenger Vehicle

You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.

Chris Valasek Hacks an SUV

Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit, discusses how he breached a vehicle on the highway to expose its cyber security vulnerabilities in this exclusive video interview.

AT&T to Link Connected Cars and Home Technologies Services

The US telecommunications company, according to a Reuters news article, wishes to strengthen its position on the market for internet-connected devices. This way, it could provide a competitive platform against other internet and communications companies, such as Verizon and Google Inc. AT&T’s products, ‘Digital Life’ for the home security and automation service and ‘Drive’ for the connected car service, will operate as one, users being able to control various home functions from the car’s dashboard.

Challenges to Make Cars Secure

Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.

Chris Valasek Hacks an SUV: Transcript

For your convenience, we've provided a transcript of our exclusive interview with Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit. Within he discusses how he breached a vehicle on the highway last month to expose its cyber security vulnerabilities.

Car Cybersecurity: What do the automakers really think?

The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and Tier One suppliers. Find out the key findings of the developer survey within!

Cyber Security - OEM Point of View

Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.

The Future of Automotive Network Solution - BUS Systems and Ethernet

Automotive IQ recently spoke with Florian Netter of Audi Electronics Venture about the current state of Automotive BUS Systems and Ethernet. Cyber security is a real challenge within BUS systems. Cyber security is and will ever be a challenge for the E/E architecture. And the more holistic the driver-supporting software interacts, the more important cyber security is.

Using wireless technology to make cars better?

Wireless applications have had a fast evolution in the past few years. From the age of laptops to being used on smartphones and tablets, this new and fast-evolving technology is moving towards the automotive industry. Connected cars are already on the road, with even more to come in the next years. As these innovations become less expensive and easier to implement, more and more automotive applications could be seen. So, what are some of the uses for wireless… cars?

Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk

New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected.

Past Speaker Interview: Chris Valasek

Chris Valasek, Director of Vehicle Security Research at IOActive, and past speaker at our summit, broaches safety technologies and intrusion detection systems in this exclusive on-site video interview.

Past Speaker Interview: Henry Bzeih

Henry Bzeih, CTO & Head of Connected Car at KIA Motors America, and past speaker at our summit, discusses the main challenges that OEMS and Tier 1 companies are experiencing in in the automotive security space, in this exclusive on-site video interview.

Automotive Cybersecurity for In-Vehicle Communication

Automotive cybersecurity issues have emerged as information technologies are increasingly deployed in modern vehicles, and security researchers have already demonstrated the associated threats and risks. Although many security protocols have been proposed, they have not considered the threats posed by denial-of-service (DoS) attacks and external connectivity vulnerabilities.

Summit speakers Kyusuk Han and Andre Weimerskirch of the University of Michigan Transportation Research Institute co-wrote this article for IQT Quarterly in the Summer of 2014 that discusses a new in-vehicle protocol called IA-CAN.

PANEL: Automotive Retail and the Connected Car

Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation. 

Automotive Cyber Security: Industry Perspectives

Executives and industry experts from Kia, Hyundai, the University of Michigan and IOActive chime in on the industry's most pressing cybersecurity issues and how to resolve them in this exclusive report.

Practical Real-Time Frame Authentication for In-Vehicle Networks

Summit speaker Kyusuk Han of the University of Michigan was kind enough to share this in-depth presentation about the need for in-vehicle security and a proposed protocol to help solve the major security problems.

Past Speaker Interview: Josh Corman

Josh Corman, Founder of I am the Cavalry, and returning speaker at the approaching summit, goes into industry challenges, and makes predictions for where automotive security is going in the next few years, in this exclusive on-site video interview.

Past Speaker Interview: Matthew Carpenter

Matthew Carpenter, Principal Security Researcher at Grimm, and past speaker at our summit, talks industry challenges, and what it would take to overhaul cyber security incident mapping, in this exclusive on-site video interview.